2020
DOI: 10.1109/access.2020.3007388
|View full text |Cite
|
Sign up to set email alerts
|

A Low Resource Consumption Clone Detection Method for Multi-Base Station Wireless Sensor Networks

Abstract: To make up the existing deficiencies of clone attack detection methods of wireless sensor networks, a low resource consumption clone detection method (MSCD) for multi-base station wireless sensor networks is proposed. MSCD has the following characteristics: (1) Running in each ring network with base station as the center and using nodes in non-hotspot area to complete clone attack detection, which reduces the effect of clone attack detection on the network lifetime; (2) Combine the head node rotation mechanism… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 26 publications
0
1
0
Order By: Relevance
“…Equation (15) gives the energy consumed by transmitting Β΅ bit data over a distance of 𝑑𝑑 meters. Different energy loss models are used according to the size of transmission distance [36]. When 𝑑𝑑 is large, the Free-space Path Loss model is selected, while the Multipath Fading model is selected when 𝑑𝑑 is small.…”
Section: E Analysis Of Explicit Wormhole Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Equation (15) gives the energy consumed by transmitting Β΅ bit data over a distance of 𝑑𝑑 meters. Different energy loss models are used according to the size of transmission distance [36]. When 𝑑𝑑 is large, the Free-space Path Loss model is selected, while the Multipath Fading model is selected when 𝑑𝑑 is small.…”
Section: E Analysis Of Explicit Wormhole Resultsmentioning
confidence: 99%
“…The value of 𝑑𝑑 depends on the distance threshold 𝑑𝑑 0 , where 𝐸𝐸 𝑒𝑒 represents the energy consumed by the sensor module to receive 1 bit of data, πœ€πœ€ 𝑓𝑓 and πœ€πœ€ π‘Žπ‘Ž represent the energy consumed by the two models to enlarge the signal, and the real energy consumed by calculation is 𝐸𝐸 π‘Ÿπ‘Ÿ . According to [36], assuming that initial energy is 150J, the message accounts for 10 bytes. The specific values of the parameters are shown in Table III.…”
Section: E Analysis Of Explicit Wormhole Resultsmentioning
confidence: 99%
“…MSCD method [26] have three parts to identifies the clone attack . The first part is to build the path of the head node and the second part is to decide the witness for each node in the network.…”
Section: Related Workmentioning
confidence: 99%